LPR: Solaris lpd Exploit

This signature detects attempts to exploit a known vulnerability in the in.lpd printer daemon running on Solaris. Solaris versions 2.6, 7, and 8 are vulnerable. Attackers can gain root access.

Extended Description

The print protocol daemon, 'in.lpd' (or 'lpd'), shipped with Solaris may allow for remote attackers to execute arbitrary commands on target hosts with superuser privileges. The alleged vulnerability is not the buffer overflow discovered by ISS. It has been reported that it is possible to execute commands on target hosts through lpd by manipulating the use of sendmail by the daemon. If this vulnerability is successfully exploited, remote attackers can execute any command on the target host with superuser privileges. This vulnerability is very similar to one mentioned in NAI advisory NAI-0020. NOTE: It has been reported that a valid printer does NOT need to be configured to exploit this vulnerability.

Affected Products

Sun solaris

References

BugTraq: 3274

CVE: CVE-2001-0353

Short Name
LPR:OVERFLOW:LPD-EXPLOIT
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
LPR
Keywords
CA-2001-15 CVE-2001-0353 Exploit Solaris bid:3274 lpd
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Sun

CVSS Score

10.0

Found a potential security threat?